IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats White Papers (View All Report Types)
 
Wireless Network Security - Next Gen Firewalls
sponsored by Dell Software
WHITE PAPER: In this white paper, examine the infrastructure of one next-gen wireless firewall.
Posted: 01 Jun 2015 | Published: 18 Dec 2014

Dell Software

Fighting Today's Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper demystifies APTs and reveals a three phase strategy to defending your network against determined cybercriminals.
Posted: 13 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

Securing Your End of Life Servers While Enabling a Safe Transition
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn how to continue running your end of life platform while avoiding common security risks and preparing to upgrade your system.
Posted: 07 May 2015 | Published: 30 Apr 2015

Trend Micro

Network Security 3 Phase Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for protecting data and defending against concealed threats. View now to learn how this strategy keeps you ahead of the curve to prevent new attacks.
Posted: 06 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

The Importance of Multi-Layered Web Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines the importance of having a multi-layered Web security approach in today's quickly evolving online market. Access now and uncover what you can do to ensure your Web security strategy is as effective and adaptive as it should be.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Melbourne IT

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

10 Essential Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper lays out 10 essential steps to email security to allow messages to move freely into, out of, and around the enterprise while stopping malicious threats such as viruses, phishing, and DDoS attacks.
Posted: 28 May 2015 | Published: 20 May 2015

Clearswift

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

The 2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2014 threat landscape and gives you the insight you need to protect your business from both known vulnerabilities and unknown exploits.
Posted: 29 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Survey Results: Endpoint Security in a Time of Uncertainty
sponsored by Malwarebytes Corporation
WHITE PAPER: In this survey report, find statistics on the most common endpoint security threats faced, what protections are being leveraged, and more.
Posted: 05 May 2015 | Published: 05 May 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement